Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Badges, Bytes and Blackmail

February 7, 2026

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Chinese Hackers Use Trusted ArcGIS App For Year-Long Persistence
News

Chinese Hackers Use Trusted ArcGIS App For Year-Long Persistence

Team-CWDBy Team-CWDOctober 14, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Security teams have been urged to adopt proactive threat hunting after a new report revealed how Chinese hackers used novel techniques to turn trusted software components into persistent backdoors.

ReliaQuest attributed the campaign to the “Flax Typhoon” APT group, a likely state-sponsored outfit known for “precise, high impact” attacks, such as those targeting Taiwanese organizations.

The report revealed that the adversaries targeted a legitimate public-facing ArcGIS (geographic information system) application. This is software that allows organizations to manage spatial data for disaster recovery, emergency management and other critical functions.

“A single compromise can disrupt core operations, expose sensitive data like infrastructure vulnerabilities attackers can exploit later, and provide a gateway for lateral movement into interconnected enterprise and operational technology (OT) networks,” ReliaQuest claimed.

Read more on Flax Typhoon: Western Agencies Warn of Risk from Chinese-Controlled Botnet

It’s unclear how initial access was achieved. However, the report claimed that post-access activity began with modifying the ArcGIS server’s Java server object extension (SOE) to behave as a web shell.

The APT group deliberately chose a public-facing ArcGIS server that was connected to a private, internal ArcGIS server for backend computations. They then:

  • Compromised a portal administrator account and deployed a malicious SOE
  • Activated the malicious SOE using a standard ArcGIS extension, invoking a REST operation to run commands on the internal server via the public portal. This helped to hide their activity
  • Sent a malicious GET web request with a base64-encoded payload in the “layer” parameter
  • Added a hardcoded key to the request. This was required to trigger the web shell and execute commands, preventing any outsiders from tampering with their access
  • Uploaded a renamed SoftEther VPN executable for long-term access. This enabled them to appear as if part of the internal network, bypassing network-level monitoring and enabling lateral movement and exfiltration
  • Targeted two workstations within the scanned subnet belonging to IT staff
     

A Wake-Up Call

Crucially, the malicious SOE web shell was stored in the victim’s backups, meaning that it persisted even after remediation and patching.

“This quiet foothold was all they needed for ‘hands-on-keyboard activity,’ enabling malicious command execution, lateral movement, and credential harvesting across multiple hosts,” the report noted.

“To prevent long-term compromises, organizations must move beyond IOC-based detection, proactively hunt for unusual behavior in legitimate tools, and treat every public-facing application as a potential high-risk asset.”

As this was the first time a malicious SOE had been used in this way, ArcGIS was forced to update its internal documentation.

“When a vendor has to rewrite its own security guidelines, it proves the flawed belief that customers treat every public-facing tool as a high-risk asset,” ReliaQuest said.

“This attack is a wake-up call: any entry point with backend access must be treated as a top-tier priority, no matter how routine or trusted.”



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleOracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More
Next Article 5 Critical Questions For Adopting an AI Security Solution
Team-CWD
  • Website

Related Posts

News

Badges, Bytes and Blackmail

February 7, 2026
News

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026
News

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

2025’s most common passwords were as predictable as ever

January 21, 2026

How to help older family members avoid scams

October 31, 2025

Why the tech industry needs to stand firm on preserving end-to-end encryption

September 12, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.